Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-3623: Plaintext Storage of a Password

0
Medium
VulnerabilityCVE-2024-3623cvecve-2024-3623
Published: Thu Apr 25 2024 (04/25/2024, 17:46:47 UTC)
Source: CVE Database V5

Description

A flaw was found when using mirror-registry to install Quay. It uses a default database secret key, which is stored in plain-text format in one of the configuration template files. This issue may lead to all instances of Quay deployed using mirror-registry to have the same database secret key. This flaw allows a malicious actor to access sensitive information from Quay's database.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 04:52:42 UTC

Technical Analysis

CVE-2024-3623 is a security vulnerability discovered in the mirror-registry installation method for Quay, a popular container image registry. The flaw arises because the installation process uses a default database secret key that is stored in plaintext within one of the configuration template files. This default key is not unique per deployment, meaning all Quay instances installed via mirror-registry share the same database secret key. The database secret key is critical for protecting sensitive information stored in Quay's backend database. Because the key is exposed in plaintext and reused across deployments, a malicious actor who gains access to the configuration files or the deployment environment can leverage this key to decrypt or access sensitive database contents. The vulnerability requires low privileges (PR:L) to exploit and does not require user interaction (UI:N). The attack vector is network-based (AV:N), meaning the attacker can exploit it remotely if they have some level of access to the environment. The vulnerability impacts confidentiality (C:H) but does not affect integrity or availability. The CVSS 3.1 score of 6.5 reflects a medium severity, balancing the ease of exploitation with the impact on confidentiality. No patches or fixes are currently linked, and no known exploits have been reported in the wild. This vulnerability highlights the risks of using default secrets and the importance of unique, securely stored keys in containerized application deployments.

Potential Impact

The primary impact of CVE-2024-3623 is the compromise of confidentiality for organizations using Quay deployed via mirror-registry. Attackers who obtain the default database secret key can access sensitive information stored in the Quay database, which may include container image metadata, user credentials, or other confidential data. This exposure can lead to further attacks such as lateral movement within the network or data exfiltration. Since the secret key is reused across deployments, a single compromise can affect multiple organizations if the key is leaked publicly or shared. The vulnerability does not directly affect data integrity or availability, but the loss of confidentiality can undermine trust in the container registry and potentially disrupt operations if sensitive data is exposed. Organizations relying on Quay for container image management, especially in cloud-native or DevOps environments, face increased risk of data breaches and compliance violations if this vulnerability is not addressed promptly.

Mitigation Recommendations

To mitigate CVE-2024-3623, organizations should immediately avoid using the default database secret key provided by mirror-registry during Quay installation. Instead, generate a unique, strong secret key for each deployment and ensure it is securely stored using secrets management solutions such as HashiCorp Vault, Kubernetes Secrets with encryption at rest, or cloud provider key management services. Review and update all existing Quay deployments installed via mirror-registry to replace the default secret key with a unique one, followed by re-encrypting or rotating database credentials as necessary. Limit access to configuration files and deployment environments to trusted administrators only, and implement strict access controls and monitoring to detect unauthorized access attempts. Additionally, organizations should monitor for any suspicious activity related to Quay database access and apply network segmentation to restrict exposure of the registry backend. Stay alert for official patches or updates from Quay or mirror-registry maintainers and apply them promptly once available. Finally, incorporate secret management best practices into the deployment pipeline to prevent similar issues in future releases.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2024-04-10T18:03:02.203Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691ec3739f5a9374a9d10ffb

Added to database: 11/20/2025, 7:29:55 AM

Last enriched: 2/28/2026, 4:52:42 AM

Last updated: 3/22/2026, 5:18:05 PM

Views: 119

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses